ALL POSTS 12 steps to safer online banking Wendy Zamora July 8, 2016 0 Comments Gone are the days of balancing check books. The advent of online banking has made budget-keeping and bill-paying a convenient, if… Intentional security holes Pieter Arntz July 7, 2016 0 Comments Sinkholes and watering holes are two expressions not automatically associated with computer security, yet they are in use to describe two tactics… “Good luck with your games!” Christopher Boyd July 7, 2016 0 Comments I’ve seen some amazing claims of security in place on scam sites down the years, alongside dazzling statements with regards how… New Mac backdoor malware: Eleanor Thomas Reed July 6, 2016 0 Comments A new piece of malware for Mac OS X has been discovered, according to a blog post from Bitdefender.This malware, which… NASA Kepler Twitter feed compromised… Christopher Boyd July 6, 2016 0 Comments Any organisation or individual can fall foul of a Twitter compromise, with Exhibit A being the feed for NASA’s Kepler. In case you… Malvertising slowing down, but not out Jérôme Segura July 4, 2016 0 Comments We have not seen very many large scale malvertising attacks following the mysterious disappearance of the powerful Angler EK. The ones we… A week in security (Jun 26 – Jul 02) Malwarebytes Labs July 4, 2016 0 Comments Last week, we talked about a new 419 scam that our researchers found in the wild and pushed out a follow… 419 scam: pay $180, receive $5,000 a week Christopher Boyd July 4, 2016 0 Comments Steer clear of the below 419 spam mail, which tries to make an offer you can’t possibly refuse (protip: totally refuse it).The… Satana ransomware – threat coming soon? Malwarebytes Labs June 29, 2016 0 Comments Petya ransomware is quickly becoming a household name and in typical cyber-criminal fashion, copycat families are starting to emerge.In this post, we have the… Previous 1 … 473 474 475 476 477 … 617 Next Contributors Threat Center Podcast Glossary Scams